Some basic concepts such as community and people in a community need to be reinforced. At this point, the relationship between a real community and a virtual community should be connected. It should be emphasized that students should always use an adult while going online and differentiate what it means to feel safe versus unsafe. Never put personal information online unless you ask an adult first. They need to understand the difference between a stranger and a trusted adult. Students need to understand that they need to be just as responsible on the Internet as they would within their own surroundings. Everything they post stays up there forever. Whether it's photographs, emails, blogs or instant messages, they are accountable for what they say and do. And what they say and do online will follow them wherever they go. NEVER THREATEN or say or write harmful things to another person online or on the phone. Students need to also understand that just because something is on the internet for them to see or view or hear that it isn't free for them to use in their own work or on their own blog, page, site or email. When they do research for projects, they must credit their sources no matter what.
Key Concepts
Review Terms Community: the area where we live, with places where we know real people. Cyber Community: a website where we visit, learn, play games, and even create characters Cyber Citizen: People who actively participate in a cyber community Cyber Smart: Making good choices when in a cyber community Responsible Citizen: A person who uses their cyber smarts Trusted Adult: A parent, teacher, or guardian Email: A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world. To send someone an e-mail message you need an e-mail account and you need to know the other person's e-mail address. Virus-A computer program that can destroy files or make your computer "crash." Viruses can be sent via e-mail or through other file-sharing programs. The use of anti-virus software and not downloading information from people you don't know can help keep viruses from damaging your computer. File - Anything that can be saved on your computer Attachment- This is a file that has been added to an e-mail. It could be something like a photograph or a clip of your favorite song. It could be something harmful to your computer, like a virus. Remind children to never open an attachment or e-mail from someone they don't know. Intellectual Property- refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. Pirates- People who take things that belong to others from the Internet without asking permission. Spam- Unwanted e-mail from someone you don't know. It is usually trying to sell you something. Plagiarism- The act of copying someone's work and claiming it as their own IM- Instant Messaging is a form of communicating instantaneously with someone else via a computer Chatrooms- Private or public places on the web where people go to chat Buddy List- a lit of screen names on an instant message program Cyberbullying- sending or posting harmful or cruel text or images using the internet or other digital communication devices.
New Terms Social Networking- A social networking site is a web site specifically focused on the building and verifying of social networks for whatever purpose. Many social networking services are also blog hosting services. Blogs- A web log is usually defined as a personal or noncommercial web site that uses a dated log format (usually with the most recent at the top of the page). It usually contains links to other web sites along with commentary about those sites. A web log is updated frequently and sometimes groups links by specific subjects, such as politics, news, pop culture, or computers.
1. Cyber Community
Concepts:
Retell the LMSD Acceptable Use Policy in own words
Just like there are rules on the school bus, students must be responsible and respectable of the district network
Some of the consequences might include suspension/termination of a network account
Watch the short video "Real Life Stories: Feathers in the Wind-Part 1". Feathers in the Wind
After watching the clip, discuss the metaphor used...the words you say online are like feathers in the wind...once you put them out there, they can't be taken back. Can the class think of other metaphors that convey the same message? Brainstorm and discuss. Perhaps an extension could be for the class to create their own short skit (or even an iMovie) to share the message with other classes and/or their families.
Not mentioned above: "The Bully Who Looks The Other Way" and does nothing...
Discussion:
What are some signs that someone might be bullying online?
What are some steps you can take if you notice someone bullying?
Activities: Review the 4 types of online bullies. Assign students into small groups and have them role play a scene where they can identify one of the 4 types of bullies mentioned above. Have the other students guess which bully scenario they are trying to role play. It might be helpful to print out the bully types and cut them up to create activity cards to handout. Discuss steps they can take to avoid cyberbullying. This is a great activity to repeat and discuss more than once!
6. Think Before You Post (1 minute duration)
Discussion: Is it OK to post your information on the Internet (blog, email, youtube, IM)? If so, when?
Video: This video is a commercial about posting on the Internet such as photos. It's a great metaphor to get the concept across to upper elementary/middle school kids about posting to the Internet, on an "online portfolio". "Once it goes up on the Internet, you can't take it back". This is not a scare tactic about posting photos, because it's OK to post when we use common sense and good judgment. It's not just about posting photos- the same applies to words as well (email, text message, IM, blogs, pages like those in "Facebook," etc.)
Grade 5
Table of Contents
The Big Idea
Some basic concepts such as community and people in a community need to be reinforced. At this point, the relationship between a real community and a virtual community should be connected. It should be emphasized that students should always use an adult while going online and differentiate what it means to feel safe versus unsafe. Never put personal information online unless you ask an adult first. They need to understand the difference between a stranger and a trusted adult. Students need to understand that they need to be just as responsible on the Internet as they would within their own surroundings. Everything they post stays up there forever. Whether it's photographs, emails, blogs or instant messages, they are accountable for what they say and do. And what they say and do online will follow them wherever they go. NEVER THREATEN or say or write harmful things to another person online or on the phone. Students need to also understand that just because something is on the internet for them to see or view or hear that it isn't free for them to use in their own work or on their own blog, page, site or email. When they do research for projects, they must credit their sources no matter what.Key Concepts
Review Terms
Community: the area where we live, with places where we know real people.
Cyber Community: a website where we visit, learn, play games, and even create characters
Cyber Citizen: People who actively participate in a cyber community
Cyber Smart: Making good choices when in a cyber community
Responsible Citizen: A person who uses their cyber smarts
Trusted Adult: A parent, teacher, or guardian
Email: A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world. To send someone an e-mail message you need an e-mail account and you need to know the other person's e-mail address.
Virus-A computer program that can destroy files or make your computer "crash." Viruses can be sent via e-mail or through other file-sharing programs. The use of anti-virus software and not downloading information from people you don't know can help keep viruses from damaging your computer.
File - Anything that can be saved on your computer
Attachment- This is a file that has been added to an e-mail. It could be something like a photograph or a clip of your favorite song. It could be something harmful to your computer, like a virus. Remind children to never open an attachment or e-mail from someone they don't know.
Intellectual Property- refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.
Pirates- People who take things that belong to others from the Internet without asking permission.
Spam- Unwanted e-mail from someone you don't know. It is usually trying to sell you something.
Plagiarism- The act of copying someone's work and claiming it as their own
IM- Instant Messaging is a form of communicating instantaneously with someone else via a computer
Chatrooms- Private or public places on the web where people go to chat
Buddy List- a lit of screen names on an instant message program
Cyberbullying- sending or posting harmful or cruel text or images using the internet or other digital communication devices.
New Terms
Social Networking- A social networking site is a web site specifically focused on the building and verifying of social networks for whatever purpose. Many social networking services are also blog hosting services.
Blogs- A web log is usually defined as a personal or noncommercial web site that uses a dated log format (usually with the most recent at the top of the page). It usually contains links to other web sites along with commentary about those sites. A web log is updated frequently and sometimes groups links by specific subjects, such as politics, news, pop culture, or computers.
1. Cyber Community
Concepts:Discussion:
Activity: Understand Your Acceptable Use Policy
2. Personal Safety
Concepts:Discussion:
Activity: Know the Rules- Take a Friend
Activity: Know the Rules- Tell People "No"
3. Cyber Security
Concepts:Discussion:
Activity: Private Information
4. Intellectual Property
Concepts:Discussion:
Activity: Whose is it, anyway?
Activity: Do The Right Thing
5. Cyberbullying
Watch the short video "Real Life Stories: Feathers in the Wind-Part 1". Feathers in the WindAfter watching the clip, discuss the metaphor used...the words you say online are like feathers in the wind...once you put them out there, they can't be taken back. Can the class think of other metaphors that convey the same message? Brainstorm and discuss. Perhaps an extension could be for the class to create their own short skit (or even an iMovie) to share the message with other classes and/or their families.
4th Grade Review Activity:
Concepts
There are 4 types of online bullies:
Not mentioned above: "The Bully Who Looks The Other Way" and does nothing...
Discussion:
Activities: Review the 4 types of online bullies. Assign students into small groups and have them role play a scene where they can identify one of the 4 types of bullies mentioned above. Have the other students guess which bully scenario they are trying to role play. It might be helpful to print out the bully types and cut them up to create activity cards to handout. Discuss steps they can take to avoid cyberbullying. This is a great activity to repeat and discuss more than once!
6. Think Before You Post (1 minute duration)
Discussion: Is it OK to post your information on the Internet (blog, email, youtube, IM)? If so, when?
Video: This video is a commercial about posting on the Internet such as photos. It's a great metaphor to get the concept across to upper elementary/middle school kids about posting to the Internet, on an "online portfolio". "Once it goes up on the Internet, you can't take it back". This is not a scare tactic about posting photos, because it's OK to post when we use common sense and good judgment. It's not just about posting photos- the same applies to words as well (email, text message, IM, blogs, pages like those in "Facebook," etc.)